anshulm / eden_guide_to_hacking

its quick to read, broadway guide to HACKING ~ for anyone to have grasp of important concepts and skills which makes up the knowledge base of a hacker

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Read it as eBook @ URL: <<SOON TO BE ADDED>>
                                                                           
.oPYo.      8                .oPYo.         o      8          ooooo        
8.          8                8    8                8            8          
`boo   .oPYo8 .oPYo. odYo.   8      o    o o8 .oPYo8 .oPYo.     8   .oPYo. 
.P     8    8 8oooo8 8' `8   8   oo 8    8  8 8    8 8oooo8     8   8    8 
8      8    8 8.     8   8   8    8 8    8  8 8    8 8.         8   8    8 
`YooP' `YooP' `Yooo' 8   8   `YooP8 `YooP'  8 `YooP' `Yooo'     8   `YooP' 
:.....::.....::.....:..::..:::....8 :.....::..:.....::.....:::::..:::.....:
::::::::::::::::::::::::::::::::::8 :::::::::::::::::::::::::::::::::::::::
::::::::::::::::::::::::::::::::::..:::::::::::::::::::::::::::::::::::::::
                                                
 o    o               8       o                 [[ Eden Guide To Hacking ]]
 8    8               8                         
o8oooo8 .oPYo. .oPYo. 8  .o  o8 odYo. .oPYo.    a Bootstrap Guide to Hacking
 8    8 .oooo8 8    ' 8oP'    8 8' `8 8    8    Practices in a major & short
 8    8 8    8 8    . 8 `b.   8 8   8 8    8    to read style...
 8    8 `YooP8 `YooP' 8  `o.  8 8   8 `YooP8    the way you don't get bored
:..:::..:.....::.....:..::...:....::..:....8    instead infer major concepts
::::::::::::::::::::::::::::::::::::::::ooP'.   and practical usability.
::::::::::::::::::::::::::::::::::::::::...::
                                                ~=ABK=~ (AbhishekKr) aBionic
                                              http://www.twitter.com/aBionic
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

[+] Eden Guide to Hacking
|
|[+] part.0* Fundamentals
| |
| |[+] chapter.0* Defining
| | |
| | |[+] article.0* Hacking, Hacker and Security
| | |[+] article.1* Hacking and Hacker's Class
| | |[+] article.2* Hacking and Ethical Hacking
| | |[+] article.3* Hacking, Crime and Law
| | |[+] article.4* Hacking and Hacker's Aim
| | |_
| |
| |[+] chapter.1* Skills Required
| | |
| | |[+] article.0* Computer Skills
| | |[+] article.1* Social Skill
| | |[+] article.2* Mental Skills
| | |_
| |
| |[+] chapter.2* Hacking Philosophy
| | |
| | |[+] article.0* Circle of Hacking
| | |[+] article.1* Art of Hacking
| | |_
| |_
|
|[+] part.1* Hacking Cycle
| |
| |[+] chapter.3* Acquire Target
| | |
| | |[+] article.0* Pre-Contract
| | |[+] article.1* Post-Contract
| | |_
| |
| |[+] chapter.4* Reconnaissance
| | |
| | |[+] section.0* Passive-Recon
| | | |
| | | |[+] article.0* Open Intelligence Gathering
| | | |[+] article.1* Meta Information Filtering
| | | |_
| | | 
| | |[+] section.1* Active-Recon
| | | |
| | | |[+] article.2* Social Engineering
| | | |[+] article.3* Eavesdropping 
| | | |[+] article.4* Shoulder Surfing
| | | |[+] article.5* Dumpster Diving
| | | |_
| | | 
| | |[+] section.2* Information
| | | |
| | | |[+] article.6* Network-Level
| | | |[+] article.7* Application-Level
| | | |[+] article.8* User-Level
| | | |[+] article.9* Required To Be Social
| | | |_
| | |_
| |
| |[+] chapter.5* Scanning
| | |
| | |[+] section.0* Network Scanners
| | | |
| | | |[+] article.0* General
| | | |[+] article.1* Service-Specific
| | | |_
| | |
| | |[+] section.1* Application Scanners
| | | |
| | | |[+] article.2* Web Scanners
| | | |[+] article.3* Database Scanners
| | | |_
| | |_
| |
| |[+] chapter.6* Vulnerabilities Profiling
| | |
| | |[+] article.0* Vulnerable Devices
| | |[+] article.1* User References
| | |[+] article.2* Processing Vulnerability Profile
| | |_
| |
| |[+] chapter.7* Exploitation
| | |
| | |[+] article.0* Own it like a Romeo
| | |[+] article.1* The Sherlock Holmes Way
| | |[+] article.2* Psychiatric Analysis
| | |[+] article.3* Trap to Trip
| | |[+] article.4* Bot-Blood-Bath
| | |_
| |
| |[+] chapter.8* System Puppet-izing
| | |
| | |[+] article.0* Tame The Rate
| | |[+] article.1* Erase Finger-prints
| | |[+] article.2* Suicide Bomber
| | |[+] article.3* Moody Mobster
| | |_
| |
| |[+] chapter.9* Reporting
| | |
| | |[+] article.0* WTTW ~ Whom To Tell What
| | |[+] article.1* How To Tell
| | |[+] article.2* Make Sure of it.
| | |_
| |_
|
|[+] part.2* Hacking Toolset
| |
| |[+] chapter.10* Software Armour
| | |
| | |[+] article.0* O.S. Distros
| | |[+] article.1* Recon-tools
| | |[+] article.2* Scanners
| | |[+] article.3* Attack Tools
| | |[+] article.4* Forensic Tools
| | |[+] article.5* More on it
| | |_
| |
| |[+] chapter.11* Software Target
| | |
| | |[+] article.0* Network Emulations
| | |[+] article.1* Weak Web Application
| | |[+] article.2* Test Anything
| | |_
| |_
|
|[+] part.3* Attack Case Studies
| |
| |[+] chapter.12* SSL Defeating Attacks
| | |
| | |[+] chapter.13* WiFi Attack
| | |[+] chapter.14* VoIP Attack
| | |[+] chapter.15* Web Javascript-Based Attack
| | |[+] chapter.16* Web SQL-Injection Attack
| | |[+] chapter.17* SMB Attack
| | |[+] chapter.18* Phishing Attack
| | |_
| |_
|
|[+] part.4* Being A Hacker
| |
| |[+] chapter.19* How to Remain A Hacker?
| | |[+] article.0* Being Aware
| | |[+] article.0* Being Curious
| | |[+] article.0* Being Secured
| | |[+] article.0* Being Contributor
| | |[+] article.0* Being Human
| | |_
| |_
|
|[+] part.5* Appendix
| |
| |[+] chapter.20* Cyber Security Links
| |[+] chapter.21* Terminology
| |_
|_

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

About

its quick to read, broadway guide to HACKING ~ for anyone to have grasp of important concepts and skills which makes up the knowledge base of a hacker